Manuscripts

Recent Papers

Research Paper

Java Byte Code Instrumentation

Bytecode Instrumentation (BCI) is a technique for adding bytecode to a Java class during “runtime.” It’s not really at runtime, but more during “load” time of the Java class.we write Java code—e.g., create a *.Java file—we compile the code—e.g., creating a *.class file, which is written in bytecode, and when we execute it, an interpreter—the Java.EXE—is responsible for actually executing the commands written in the bytecode format within the *.class file. As with any interpreter, since we are not dealing with real object code, one can manipulate the actual code written in the executed file. I want to add functionality to a Perl/PHP/JSP/ASP code—that’s easy. We could simply open the file in a text editor, change the code, and next time it was executed it would behave differently. we could easily write a program that changes the code back and forth as we wish as a result of some user interface activity. With bytecode, it’s the same concept, only a bit trickier. Try to open bytecode in a text editor—not something we want to work with…but still possible.Anyhow, the way to manipulate the actual bytecode is by intervening during the class loading flow and changing the code on the fly. Every JVM (Java Virtual Machine) will first load all the class files (sometime it will do it only when really required, but that doesn’t change the following description) to its memory space, parsing the bytecode, and making it available for execution. The main() function, as it calls different classes, is actually accessing code which was prepared by the JVM’s class loaders. There is a class loader hierarchy, and there is the issue of the classpath but all that is out of the scope of So the basic concept of bytecode instrumentation is to add lines of bytecode before and after specific method calls within a class, and this can be done by intervening with the class loader. Back in the good old days, with JDK <1.5, we needed to really mess with the class loader code to do that. From JDK 1.5 and above, Java introduced the Java agent interface, which allows writing Java code that will be executed by the class loader itself, thus allowing the manipulation of the bytecode within every specific class, and making the whole process pretty straightforward to implement, thus the zillion different products for Java profiling and “transaction management” for Java applications.

Published by: Vipul Saini, Ajay Kumar Singh

Author: Vipul Saini

Paper ID: V4I2-1969

Paper Status: published

Published: April 20, 2018

Full Details
Research Paper

A Comprehensive techno-economic study of effluent treatment plant of yarn manufacturing industry to meet the zero liquid discharge standards

The yarn manufacture industry, which we are working on zero liquid discharge, is mainly a chemical Industry effluent treatment plant discharging around 10,000m3/day. So achieving zero liquid discharge, this huge discharge can be eliminated and daily water consumption of industry can be reduced. The effluent coming to effluent treatment plant is having some significant effluent characteristics like mostly varying PH, high BOD, high, COD, heavy metal. Basic study of the current effluent plant including load, parameters of effluent & treatment. Identify the gap between present ETP at yarn manufacture industry and zero liquid discharge ETP. The ZLD process also makes effective use of wastewater treatment, recycling, and reuse. We use primary data collection method and collect the parameter of effluent and treated effluent as well as load calculations for better design.

Published by: Vala Sangita V, A. N. Vaghela, Ranjit Barad

Author: Vala Sangita V

Paper ID: V4I2-2011

Paper Status: published

Published: April 19, 2018

Full Details
Research Paper

Two clouds secure database for numerically related SQL range queries with privacy preservation

In the present scenario, businesses and people are outsourcing database to minimize their effort and to obtain a low cost service. In order to provide the sufficient functionality for SQL queries, many secure database schemes have been proposed. However, such schemes are vulnerable to privacy leakage to cloud server. For numerical range inquiry (>, <, and so forth.) these neglect to give adequate security insurance. A portion of the difficulties faced are privacy leakage of statistical attributes, access patterns and so on. Likewise increased number of queries will release more information to the cloud server. We have studied some of these research works and analyzed the best possible ways to come to the desired level of privacy preservation in the case of cloud computing. We have proposed a two-cloud architecture for secure database, with a series of intersection protocols that provide privacy preservation to various numeric-related range queries. Security analysis shows that privacy of numerical information is strongly protected against cloud providers in our proposed scheme.

Published by: Sruti S, Shruthi S, Varsha S, Radhika S

Author: Sruti S

Paper ID: V4I2-1853

Paper Status: published

Published: April 19, 2018

Full Details
Research Paper

IoT for monitoring diabetic patients

Diabetes is the most common disease in the world which will lead to death when there is no proper health care. Failure to control the disease not only results in long-term complications but also affects the life of the patients. If the glucose level is monitored day-by-day, it will help the patient to manage their health properly. The feedback information regarding their sugar level is helpful for the patient to take care of the health daily. In this paper, we discuss the system that is designed to monitor the glucose level, blood pressure and temperature of the person. By making the data available in the cloud, it can be used by the doctors to get the historical data. This will help better healthcare management of their patients. This system is implemented by using the Raspberry Pi for reading data from the user. The ADC is also used to convert the analog signal into the digital signals. The project implementation details are discussed in this paper.

Published by: R. Vasanthakumar, K. D. Darsini, S. Subbaiah, Dr. K. Lakshmi

Author: R. Vasanthakumar

Paper ID: V4I2-1856

Paper Status: published

Published: April 19, 2018

Full Details
Thesis

Shock tuning of FOX FLOAT 3 EVOL R

FOX FLOAT 3 EVOL R air shocks are high- performance shock absorbers that use air as springs, instead of heavy steel coil springs or expensive titanium coil springs[4]. Underneath that air, the sleeve is a high- performance, velocity-sensitive, shimmed damping system[4]. FLOAT 3 EVOL R air shock dampers contain high-pressure nitrogen gas and FOX high viscosity index shock oil separated by an Internal Floating Piston system[4]. This helps to ensure consistent, fade-free damping in most riding conditions. There are two chambers in the shocks. One of the chambers is MAIN AIR CHAMBER and other is EVOL CHAMBER. The air pressure in EVOL air chamber is adjusted to control the vehicle corner roll and bottom-out characteristics. The air pressure in the MAIN air chamber is adjusted to change the ride height and suspension stiffness[4].

Published by: Swapnil Kumar, Kavitha K

Author: Swapnil Kumar

Paper ID: V4I2-2019

Paper Status: published

Published: April 19, 2018

Full Details
Research Paper

An FPGA based snake robot

Snake robots are designed to safely perform the tasks that aren't easily done by Humans. There are many applications of Snake robots like Laser cutting from performing surgery to inspection. And also in rescue operations. During the last decade to now, the published literature of Snake robots has been increased vastly. However, no review has done on the locomotion of a Snake Robot using FPGA. The purpose of this paper is to give such review has been widely studied in the past several decades by lots of researchers. In this paper, we survey and discuss the state of the art, challenges, and possibilities of perception-driven obstacle-aided locomotion for snake robots. According to that obstacle, the action is taken on that obstacle by snake robot and how it destroys it. The project is developed by choosing software which we have chosen is Xilinx ISE10.4 environment using verilog and synthesized on FPGA part Spartan3AN board. Xilinx is a powerful software tool that is used to design, synthesize, simulate, test and verify digital circuit designs.

Published by: Mudasar Basha, Javeria Azain, K. Mounika, P. Akshitha

Author: Mudasar Basha

Paper ID: V4I2-2001

Paper Status: published

Published: April 19, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X